General
-
Target
IvAEGoijbASEGjo.exe
-
Size
4.8MB
-
Sample
230205-2y5vmsef2x
-
MD5
d9b79da11f22ccdb255572afae699563
-
SHA1
0918ecc9efee1b95d002c5c2884f3108e731c302
-
SHA256
2effe116bae12db344d860be05ab14d7f38ea599a7c8bb873477f101d324c5ec
-
SHA512
875711db059d06368c1921ba41fa3cd07b4b376f2badd3a20f2ffa7745b6cb9cd5d738a99baaf107d0f0aaca8ad798ad4ad1d92956f47419690912afab99a20c
-
SSDEEP
98304:P27dEgmm1/tAE0rlxcFv7gV66KQcwzdHdjEtzGOIkXBfKM:+Cg92E6fRwrkHdMSMRff
Behavioral task
behavioral1
Sample
IvAEGoijbASEGjo.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
IvAEGoijbASEGjo.exe
-
Size
4.8MB
-
MD5
d9b79da11f22ccdb255572afae699563
-
SHA1
0918ecc9efee1b95d002c5c2884f3108e731c302
-
SHA256
2effe116bae12db344d860be05ab14d7f38ea599a7c8bb873477f101d324c5ec
-
SHA512
875711db059d06368c1921ba41fa3cd07b4b376f2badd3a20f2ffa7745b6cb9cd5d738a99baaf107d0f0aaca8ad798ad4ad1d92956f47419690912afab99a20c
-
SSDEEP
98304:P27dEgmm1/tAE0rlxcFv7gV66KQcwzdHdjEtzGOIkXBfKM:+Cg92E6fRwrkHdMSMRff
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Sets service image path in registry
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-